Steganography
-
Upload
khushbu-chudasama -
Category
Engineering
-
view
450 -
download
0
description
Transcript of Steganography
![Page 1: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/1.jpg)
Steganography
Presented by:Chudasama KhushbuVIII sem-CSE10ECACS003
Presentation On
![Page 2: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/2.jpg)
Outlines
What is Steganography?
History of Steganography
Steganography, Cryptography & Watermarking
Types of Digital Steganography
Image based Technique
Security
Use of steganography
![Page 3: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/3.jpg)
Greek Words:STEGANOS – “Covered”GRAPHIE – “Writing”
Steganography is the art and science of writing hidden
messages in such a way that no one apart from the intended
recipient knows of the existence of the message.
This can be achieve by concealing the existence of information within seemingly harmless carriers or cover
Carrier: text, image, video, audio, etc
Steganography
![Page 4: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/4.jpg)
Tattoos on shaved heads
Wax-covered tablets
Microdots – shrunken pictures
Invisible Inks - milk, fruit juice, urine
History of Steganography
![Page 5: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/5.jpg)
STEGANOGRAPHY TERMS
Carrier or Cover File
Stego-Medium
Embedded or Payload
Steganalysis
![Page 6: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/6.jpg)
Security Systems
Cryptography
Information Hiding
Steganography
Watermarking
Steganography, Cryptography&Watermarking
![Page 7: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/7.jpg)
Major two branches of information hiding, Steganography and Watermarking.
Steganography and Cryptography are closely related.
The difference is in their goals.
Conti..
![Page 8: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/8.jpg)
Cryptography
• Science of writing in secret code and is an ancient art.
• Achieve security by encoding messages to make them non-readable.
• Process to convert Plain Text in to Cipher Text.
• Plain Text: Clear Text• Cipher Text: Codified Text
Plain Text
Cryptography Tech
Cipher Text
![Page 9: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/9.jpg)
Watermarking
• Used to verify the identity and authenticity of the owner of a digital image.
• Process in which the information which verifies the owner is embedded into the digital image or signal. Signals could be either videos or pictures or audios.
• Two types; visible watermarking and invisible watermarking.
![Page 10: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/10.jpg)
![Page 11: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/11.jpg)
Steganography
How It Works
![Page 12: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/12.jpg)
Main difference is..
Cryptography: although encypted and unreadable,the existence of
data is not hidden
Steganography: no knowledge of the existence of the data
Watermarking: extending the file with extra information
Conti..
![Page 13: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/13.jpg)
Steganography
Encode message
Decode message
STEGANOGRAPHY STEPS
![Page 14: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/14.jpg)
ENCODING
Step 3
• Steganographic data
Step 2
• Encode embedded data with cover data
Step1
• Prepare cover data
![Page 15: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/15.jpg)
DECODING
• Steganographic Data
Step1
• Decode Plain info
Step 2• Embedded
data obtained
Step 3
![Page 16: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/16.jpg)
Hiding a Message inside Text
Hiding a Message inside Images• Most popular technique
Hiding a Message inside Audio and Video Files
Types of Steganography
![Page 17: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/17.jpg)
Hiding a Message inside Text
Partially effective Example:
randoM capitalosis is a rarE disEase ofTen
contrAcTed by careless inTernet users. tHis sad
illnEss causes the aFfected peRsON To randomly
capitalize letters in a bOdy oF texT. please
do not confuse this disease witH a blatant
attEmpt aT steganogRAPhy.
Reveals: MEET AT THE FRONT OF THE TRAP
![Page 18: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/18.jpg)
Hiding a Message inside Images
Most widely used medium today.
Takes advantage of our limited visual perception of colors.
This field is expected to continually grow as computer graphics power also grows.
![Page 19: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/19.jpg)
Image Attributes:
• Digital images are made up of pixels.
• The arrangement of pixels make up the
image’s “raster data”.
• 8-bit and 24-bit images are common.
• The larger the image size, the more
information you can hide.
![Page 20: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/20.jpg)
Hiding a Message inside Audio and Video Files
• Embedding secret message in to digital sound is known as audio & video steganography.
• Large amount of data that can be hidden inside.
• Hard to recognize because of the continuous flow of information (moving stream of images and sound).
![Page 21: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/21.jpg)
The most common approaches to information hiding in images are:
Least significant bit (LSB) Insertion
Masking and Filtering Techniques
Algorithms and Transformations
Image based Technique
![Page 22: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/22.jpg)
Least Significant Bit (LSB) Insertion
Most popular technique when dealing with images.
Replaces least significant bits with the message to be encoded.
It is best to use images with “noisy areas” – areas with ample color variation and without large areas of solid color.
Requires on average that only half the bits in image be changed.
![Page 23: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/23.jpg)
Example:
example shows how the letter A can be hidden in the first eight bytes of three pixels in a 24-bit image.
Pixels:
(00100111 11101001 11001000) (00100111 11001000 11101001) (11001000 00100111 11101001)
![Page 24: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/24.jpg)
A: 10000001
Result: (00100111 11101000 11001000)(00100110 11001000 11101000)(11001000 00100111 11101001)
Only three bits that were actually altered. A only requires eight bytes to hide it in, the ninth
byte of the three pixels can be used to hide the next character of the hidden message.
![Page 25: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/25.jpg)
Masking and Filtering
• Uses..Digital Watermarking – provides identification
pertaining to the owner; I.e. license or copyright information - Invisible & Visible
Fingerprinting – provides identification of the user; used to identify and track illegal use of content
![Page 26: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/26.jpg)
Confidentiality: any unauthorized person does not know that sensitive data exists
Survivability: verifing that the data does not get destroyed in the transmission
No detection: cannot be easily found out that the data is hidden in a given file
Visibility: people cannot see any visible changes to the file in which the data is hidden
Security
![Page 27: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/27.jpg)
Governments
Businesses: Digital Watermarking
Individuals
Uses of Steganography
![Page 28: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/28.jpg)
ILLEGAL USAGE
HACKERS
TERRORISTS
CRIMINALS
![Page 29: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/29.jpg)
U.S. officials said on 5 February 2001 that Late. Osama bin Laden was posting instructions for terrorist activities. He was master in this technology.
The 9/11 attack heightened our awareness of steganography. It is well published that Bin Laden and his terrorist cells use steganography for communications
![Page 30: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/30.jpg)
Live Demo:
![Page 31: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/31.jpg)
QUERIES
![Page 32: Steganography](https://reader034.fdocuments.in/reader034/viewer/2022051109/54785149b4af9fbf708b472c/html5/thumbnails/32.jpg)